Skip to main content

Home/ Healthcare 2.0/ Group items tagged how

Rss Feed Group items tagged

Roger Steven

An Ethical Use of Electronics, EHR, and e-Anything - 0 views

  •  
    Overview: Essentially, covering in 90 minutes the basics of E everything that applies to your clinical work. We will give you the questions to ask your IT people, because you should not implicitly trust them, because the law will hold you accountable more than them. We will first cover the general principles of electronic compliances as laid forth in HIPAA. We will then discuss how this applies to your desktop/laptop/iPads and smart devices, other electronic equipment such as routers and modems. We also cover the use of email, secure mail and your EHR/EMR. We will discuss the pros and cons of using the cloud for your data storage and EHR/EMR, i.e. knowing what a HIPAA compliant data center looks like. Principles in the use of encryption and passwords and other security principles will also be covered. Why should you Attend: Unless you are 100% sure you've thought through every angle of your patient's electronic PHI and you sleep like a baby never concerned about this then you need to attend. If you have any questions about the details of what electronic compliance looks like and how it's applied in day-to-day clinical and business activities, interactions with vendors, EHR/EMR, your relationship with your ISP and IT providers, use of all electronic devices, then this workshop is for you. It also gives you principles to apply in new situations which are likely to arise frequently. If you wrote the book on this it would be out of date in 24 hours, so what's important is to learn how to think about these things and use your resources to stay ahead of the game. If you are confident you have the basics covered on every item listed below then this seminar is not for you. Areas Covered in the Session: HIPAA electronic compliance Secure use of EHR/EMR Email and secure mail use Encryption and password security principles Interfacing with the public Interfacing with vendors such as ISPs and other telecommunication companies Backups Cloud use How to know your data center
Roger Steven

Understanding Medicare's Value Based Modifier Program - A Primer for Medical Practices - 0 views

  •  
    Overview: This webinar is designed for medical practice leaders to gain a working knowledge of the Value-Based Modifier program and how your cost and quality metrics will be used to determine your Medicare payments in future years. Why should you Attend: Your future Medicare payments are at risk. 2018 payment rates may be cut up to 6% if you fail to report quality measures to CMS for the 2016 calendar year. Your practice can also see cuts of 1-4% if you are an outlier on costs or quality. On the other hand, practices that show they are significantly better than average on costs and/or quality can receive an increase over the standard Medicare payment rates. You'll want to understand how this program works, what the potential impact for your practice is, and what steps you need to take now to ensure success in 2018. Areas Covered in the Session: What types of medical practices are impacted by the VBM program and how much is at risk for practices of different sizes. What cost and quality metrics are used and how are they combined to yield your practice's future payments What are the timelines for submitting data and reviewing your status What actions you can take now to ensure the highest possible Medicare payments in future years Who Will Benefit: Practice Administrators Physicians, Podiatrists, Physician Assistants, Nurse Practitioners, CRNAs Quality Officers Nurse leaders Finance Directors Speaker Profile Jeanne J. Chamberlin Jeanne Chamberlin is currently a Practice Management Consultant with MSOC Health. During her 30 years in the healthcare industry, Jeanne has worked in independent medical practices, health systems, state government, and software development. She holds a Masters Degree in Public Policy from Duke University and is a fellow in the American College of Medical Practice Executives. She has been a leader in both state and local MGMA chapters. As practice administrator of a 10-physician multi-specialty practice, Jeanne first began
Roger Steven

Understanding Medicare's Value Based Modifier Program - A Primer for Medical Practices - 0 views

  •  
    Overview: This webinar is designed for medical practice leaders to gain a working knowledge of the Value-Based Modifier program and how your cost and quality metrics will be used to determine your Medicare payments in future years. Why should you Attend: Your future Medicare payments are at risk. 2018 payment rates may be cut up to 6% if you fail to report quality measures to CMS for the 2016 calendar year. Your practice can also see cuts of 1-4% if you are an outlier on costs or quality. On the other hand, practices that show they are significantly better than average on costs and/or quality can receive an increase over the standard Medicare payment rates. You'll want to understand how this program works, what the potential impact for your practice is, and what steps you need to take now to ensure success in 2018. Areas Covered in the Session: What types of medical practices are impacted by the VBM program and how much is at risk for practices of different sizes. What cost and quality metrics are used and how are they combined to yield your practice's future payments What are the timelines for submitting data and reviewing your status What actions you can take now to ensure the highest possible Medicare payments in future years Who Will Benefit: Practice Administrators Physicians, Podiatrists, Physician Assistants, Nurse Practitioners, CRNAs Quality Officers Nurse leaders Finance Directors Speaker Profile Jeanne J. Chamberlin Jeanne Chamberlin is currently a Practice Management Consultant with MSOC Health. During her 30 years in the healthcare industry, Jeanne has worked in independent medical practices, health systems, state government, and software development. She holds a Masters Degree in Public Policy from Duke University and is a fellow in the American College of Medical Practice Executives. She has been a leader in both state and local MGMA chapters. As practice administrator of a 10-physician multi-specialty practice, Jeanne first began working wi
Roger Steven

Strategies to Comply with Difficult Healthcare Fraud, Waste and Abuse Laws - 0 views

  •  
    Overview: Become knowledgeable and understand the False Claims Act, Anti-Kickback Statute, Physician Self-Referral Law, Excluded Individuals and additional criminal/civil laws that may worsen the punishment if these laws are violated. Understand the criteria of each law, exceptions and how to identify an issue that requires mitigation. Why should you Attend: Are you able to distinguish with certainty an agreement, contract or activity that is permissible versus one that is not under our current healthcare laws and regulations? Do you have a contract organization system where reviews are done regularly and retained centrally? Do you conduct auditing and monitoring of potential high risk compliance areas related to fraud, waste and abuse? If you are uncertain or need additional guidance on recognizing potential violations of healthcare fraud, waste and abuse regulations and how to audit and monitor for non-compliance, this training is for you. Areas Covered in the Session: Define and describe elements of the Anti-kickback Statute, False Claims Act, Exclusionary Rule, Physician Self-Referral Law and potential penalties for violations Discuss exceptions and related criteria to the Physician Self-Referral Law and the Anti-Kickback Statute Identify common potential issues that may result in violations and how to avoid or mitigate them Provide examples on how to comply with the regulations Describe areas to audit, monitor and implement policies/procedures for compliance Who Will Benefit: Health care providers Revenue cycle management employees Coders, Billers Compliance officers Contract management Compliance and Internal Audit professionals Healthcare administrators Speaker Profile Gail Madison Brown is a registered nurse and an attorney with over 25 years of experience in health care. For the last 15 years she has focused on health care compliance and revenue cycle management operations. Gail's experience ranges from starting new compliance programs and making impr
Roger Steven

Seminar on Validation and 21 CFR 11 Compliance of Computer Systems Intermediate to Adva... - 0 views

  •  
    Course "Validation and 21 CFR 11 Compliance of Computer Systems: Intermediate to Advanced" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Computer Systems Validation (CSV) also known as Software Validation is all-pervasive in the Life Sciences Industry. It is a requirement of all the predicate rules, as well as 21 CFR 11 and Annex 11. However, unless one knows how to implement CSV, it is often very hard to detect the requirement for CSV, and very hard to determine what needs to be done, to meet domestic and / or international regulations or business continuity requirements. In addition, the FDA has stepped up 21 CFR 11 inspections that include CSV. This course will build on the Validation and 21 CFR 11 Compliance Basic Course, to give hands on experience on executing on the computer systems validation of a system, and to discuss related activities such as Validation Master Plan, Infrastructure Qualification, Project Management for Validation and Validation of Test Tools The attendees must have attended the Basic Validation & 21 CFR 11 Compliance. This is a very hands-on class and the attendees will be expected to use templates provided in the class to create the complete package for the validation of a system The Seminar: This Hands-On course will provide the attendees with more detailed experience on validation / 21 CFR 11 compliance of a computer system, as well as details for activities associated with computer systems validation as follows: 1. Validation Master Plan 2. Complete Validation for a System 3. Excel Spreadsheet Validation 4. Change Control 5. SOPs 6. Test Tools Validation 7. Project Management for Validation Who Should Attend : * VP of IT * Director of IT * Quality Managers * Project Managers (for CSV / IT) * Validation Specialists * Database Administrators * System Administrators * Directors / Senior Directors of Discovery * Directors /
Roger Steven

Seminar on HIPAA Security & Privacy Official - Roles and Responsibilities at Houston, TX - 0 views

  •  
    Course "HIPAA Security & Privacy Official - Roles and Responsibilities" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Being the HIPAA Security and Privacy Official involves not only ensuring you know the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the fundamentals of a HIPAA compliance program. If your HIPAA Security and Privacy Official needs to understand what all the HIPAA requirements are or make sure the current program is adequate and can withstand government scrutiny, please join us for this informative and interactive seminar. Why you should attend: The HIPAA Security and Privacy Official is the backbone of any organization's compliance program. Often times this role is assigned as collateral duty in smaller organizations. Regardless the size of an organization, the HIPAA Security and Privacy Official must know all the requirements for compliance. This is a critical element of the position. Attendees will leave the course clearly understanding the role and all the requirements as the designated as a HIPAA Security and Privacy Official. This seminar will cover reviews, creation, and amending policy and procedure. After completing this course, a HIPAA Security and Privacy Official will have a clear understanding for what needs to be place when it comes to all of the HIPAA regulations. Areas Covered in the Session: Why was HIPAA created? The Role and Responsibilities of the HIPAA Security and Privacy Official Complying with HIPAA Requirements? What are the HIPAA Security
Roger Steven

OIG CIAs: What Do They Mean To Your Compliance Program? - 0 views

  •  
    Overview: Learn how to improve your healthcare compliance program by using requirements found in corporate integrity agreements (CIAs) issued by the OIG. By proactively incorporating various features of CIAs, healthcare providers of all types can be better assured of meeting compliance standards. While there are many different types of healthcare compliance issues, probably the area of most concern is that of properly filing claims and receiving appropriate reimbursement. The OIG has issued various types of guidance including Federal Register entries, fraud alerts, and issues as listed in the OIG Work Plans. By providing such guidance, the OIG has given healthcare providers notice so that there can be no defense of not knowing about an issue. By organizing your compliance program to detect and then correcting various types of issues is a major objective of having a compliance program. Understanding systematic processes for improving your healthcare compliance program using CIA requirements can forestall possible criminal and civil monetary penalties. The hundreds of CIAs that have been developed when the OIG detects fraudulent activities can be used as a guide for developing and improving healthcare compliance programs for all types of healthcare providers. The process of statistical extrapolation is used by the OIG when conducting studies in order to determine recoupment amounts. Statistical extrapolation can also be used by healthcare providers when determining possible overpayments. However, the proper use of statistical extrapolation is a formal and complex mathematical process that must be properly applied. The OIG CIAs provide another resource for healthcare providers to study, understand, and then apply as appropriate. Why should you Attend: What are the OIG Corporate Integrity Agreements (CIAs)? Why does the OIG issue CIAs? Can I use general requirements from CIA to avoid monetary penalties or even avoid going to jail? Can any healthcare provider use
Roger Steven

Blood Borne Pathogens - 0 views

  •  
    Overview: This webinar will provide up to date information about what constitutes blood borne pathogens from infectious materials, as well as other potentially infectious materials. The webinar will provide answers about how to prevent exposures, deal with spills or exposures should they occur, and the how to recognize the hazards of blood borne pathogens. A thorough description of the types of infections of concern for blood borne pathogens, how one might be exposed, the differences between blood born infections and other potentially infectious materials, methods for dealing with potential exposures or spills, and the requirements from OSHA to protect workers from exposure or to track exposures if they occur. Areas Covered in the Session: Infectious materials Other potentially infectious materials Prophylactic techniques that might be available Use of personal protective equipment Policies and procedures required by OSHA to protect workers Who Will Benefit: Safety Professionals Administrators Lab Workers Those who might be exposed to blood borne pathogens Speaker Profile Kenneth S. Weinberg is an independent consultant in environmental health and safety. Dr. Weinberg has consulted for several companies in the areas of OSHA Injury and Illness reporting, as well as auditing for OSHA inspections. He has worked as the Director of Safety at Mass. General Hospital in Boston for almost twelve years, and has written several books on the topics of health care safety, OSHA, and Indoor Air Quality. He has also written several articles for prominent national safety publications, and serves on the editorial advisory boards for safety publications. He Also has been Administrator of the Health Care Divisio0n of the American Society of Safety Engineers, and is a member of several panels that advice on safety related matters. Price : $139.00 Contact Info: MentorHealth Phone No: 1-800-385-1607 FaX: 302-288-6884 support@mentorhealth.com Event Link: http://bit.ly/Blood-B
Roger Steven

Seminar on Validation and 21 CFR 11 Compliance of Computer Systems: Intermediate to Adv... - 0 views

  •  
    Course "Validation and 21 CFR 11 Compliance of Computer Systems: Intermediate to Advanced" has been pre-approved by RAPS as eligible for up to 12 credits towards a participant's RAC recertification upon full completion. Overview: Computer Systems Validation (CSV) also known as Software Validation is all-pervasive in the Life Sciences Industry. It is a requirement of all the predicate rules, as well as 21 CFR 11 and Annex 11. However, unless one knows how to implement CSV, it is often very hard to detect the requirement for CSV, and very hard to determine what needs to be done, to meet domestic and / or international regulations or business continuity requirements. In addition, the FDA has stepped up 21 CFR 11 inspections that include CSV. This course will build on the Validation and 21 CFR 11 Compliance Basic Course, to give hands on experience on executing on the computer systems validation of a system, and to discuss related activities such as Validation Master Plan, Infrastructure Qualification, Project Management for Validation and Validation of Test Tools The attendees must have attended the Basic Validation & 21 CFR 11 Compliance. This is a very hands-on class and the attendees will be expected to use templates provided in the class to create the complete package for the validation of a system The Seminar: This Hands-On course will provide the attendees with more detailed experience on validation / 21 CFR 11 compliance of a computer system, as well as details for activities associated with computer systems validation as follows: 1. Validation Master Plan 2. Complete Validation for a System 3. Excel Spreadsheet Validation 4. Change Control 5. SOPs 6. Test Tools Validation 7. Project Management for Validation Who Should Attend: * VP of IT * Director of IT * Quality Managers * Project Managers (for CSV / IT) * Validation Specialists * Database Administrators * System Administrators * Directors / Senior Directors of Discovery * Directors / Senior
Roger Steven

The Drunk, High, or otherwise Impaired Health Care Practitioner: What can be done to Help - 0 views

  •  
    Overview: Health care practitioners and other licensed professionals work in today's diverse, fast-changing, multidisciplinary environment. All licensed professions have higher rates of drug abuse, alcohol abuse, and mental health issues. Yet each individual profession has a unique, though similar, state laws which govern how state licensing agencies take action against the professional so as to protect the public. The state's authority and power over licensed professionals often presents challenges to the impaired practitioner that are not easy to navigate. All licensed professionals must adhere to standards of state law which govern their professional practices and include prohibitions for impaired practice - even impairment along that is apart from any direct professional harm. Complaints that are received and investigated by a state agency leave the licensed professional with an uncertain process to handle the state action against them. Coupled with numerous related consequences, such as loss of employment, family issues and divorce, and criminal actions, the licensed professional must handle all these challenges successfully. Learn to identify and understand varying state laws that apply to allow disciplinary action against the licensed professional, both immediately and temporarily, and those which are permanent and final. Review the most common successful elements of the rehabilitation of the licensed professional faced with the deadly consequences of addiction. Compare and contrast regulatory laws and due process requirements for state action. This allows the licensed professional to avoid career-ending sanctions and to defend successfully against legal actions which may result in ruinous practice and career consequences for the professional. This program offers an objective, thorough review of laws which apply to the impaired licensed professional. Why should you attend: Health care practitioners are faced with a higher lifetime risk of drug abuse,
Roger Steven

Blood Borne Pathogens - 0 views

  •  
    Overview: This webinar will provide up to date information about what constitutes blood borne pathogens from infectious materials, as well as other potentially infectious materials. The webinar will provide answers about how to prevent exposures, deal with spills or exposures should they occur, and the how to recognize the hazards of blood borne pathogens. A thorough description of the types of infections of concern for blood borne pathogens, how one might be exposed, the differences between blood born infections and other potentially infectious materials, methods for dealing with potential exposures or spills, and the requirements from OSHA to protect workers from exposure or to track exposures if they occur. Areas Covered in the Session: Infectious materials Other potentially infectious materials Prophylactic techniques that might be available Use of personal protective equipment Policies and procedures required by OSHA to protect workers Who Will Benefit: Safety Professionals Administrators Lab Workers Those who might be exposed to blood borne pathogens Price : $139.00 Contact Info: MentorHealth Phone No: 1-800-385-1607 FaX: 302-288-6884 support@mentorhealth.com Event Link: http://www.mentorhealth.com/control/w_product/~product_id=800684LIVE/ http://www.mentorhealth.com/ LinkedIn Follow us - https://www.linkedin.com/company/mentorhealth Twitter Follow us - https://twitter.com/MentorHealth1 Facebook Like us- https://www.facebook.com/MentorHealth1
lifelinelab

BREAST CANCER SCREENING - 0 views

  What is screening ? Screening is looking for cancer before a person has any symptoms. This can help find cancer at an early stage. When abnormal tissue or cancer is found early, it may b...

Bestpathologylabs bestpathlabnearme Bestdiagnosticlab diagnosticcenternearme bestdiagnosticcenternearme diagnosticcenter bloodtestathome bloodtestathomenearme bloodonlinetest onlinebloodtest onlinebloodtestlabindelhi thyroidtestathome thyroidtestlabnearme

started by lifelinelab on 07 Dec 18 no follow-up yet
fnfdoc

How To Prevent Diabetes Type 2 | Your Health Our Priority - 0 views

  •  
    How To Prevent Diabetes Type 2? You have just discovered that you are prediabetic. You can take meaningful steps to reduce your risk of diabetes. You can actually prevent diabetes simply by changing what you eat and how you invest in your physical health. The ball, my friend, is still in your court.
  •  
    Around 8.3 percent population in the US has diabetes. Type II is the most prevalent form of diabetes. It is common among the young and the obese. Diabetes Mellitus or simply diabetes is a group of metabolic disorders characterized by an increase in your blood sugar. This results from an inadequate amount of insulin in the body or the cells' inability to respond to insulin.
mmarytd

How to Get Better sleep During injury? - 1 views

Injured person sleeping problem is the most important things here some tips may help their. Sleeping with decrease returned pain For everyone struggling with decrease again pain, sound asleep in a...

Healthcare health sleep

started by mmarytd on 29 Nov 20 no follow-up yet
Roger Steven

Disposition of Records and Records Retention for Medical Records, Including Electronic ... - 0 views

  •  
    Overview: Today's health care delivery occurs in a diverse, fast-changing, multidisciplinary health care environment. This often presents challenges to the health care professional that are not easy to navigate. Medical records and their confidentiality have long been the exclusive province of state law, but has now been recognized for some time in the federal HIPAA statutes and federal regulations. Differing and even conflicting sources of requirements at the state level still exist for the retention and disposition of medical records. These sources may vary based upon the specific health care practitioner - whether physicians, dentists, psychologists, or other health care providers, including mental health practitioners. As to the specific, individual health care practitioner, state laws mandate their confidentiality, retention, and even their specific content with regards to patient, clinical records. In addition to these clinical requirements, additional state laws set forth the content and retention of other types of records kept by the professional, such as supervisory agreements with other professionals subordinate to them as well as their own unique record content requirements. With the majority of medical records moving to an electronic format, special rules now exist with regard to the confidentiality, security, retention, and disposition of electronic medical records. This is particularly important as state laws continue to allow for and regulate the provision of telemedicine by various health care practitioners. For example, while psychotherapy and mental health services are ideal treatments to offer over the internet, that is, by simultaneous audio-visual transmission between the doctor and the patient, the risks of breaches of confidentiality also vastly increase. And when the successful doctor-patient relationship is over, how does the health care practitioner providing a mental health service dispose of these electronic records? In addition to
Roger Steven

Personality 101: Recognizing and Responding to Personality Disorders in College Students - 0 views

  •  
    Overview: Have you ever had a student who was excessively dramatic or who repeatedly monopolized discussions in a know-it-all, domineering, or aggressive fashion? Perhaps you've encountered a student who was so odd or anxious that they weren't able to participate in group activities or complete assignments. It's hard to know what to do when a student's personality just seems to take over your class, but you can't just stand by and do nothing. If they are not managed effectively, students with personality disorders take up a lot of time and can move your whole class in counterproductive directions. Sometimes these challenging students have a Personality Disorder, which is a persistent pattern of perceiving, relating to, and thinking about the environment and themselves that is maladaptive, rigid, pervasive, and enduring. Personality Disorders also manifest in the student's emotional response and impulse control and can negatively impact classroom teaching and learning as well as a student's personal and academic success. Unless you are a particular student's psychiatrist, it's not your job to diagnose them as having a personality disorder, but it is helpful to recognize and understand signs of a personality disorder. This webinar will identify different personality disorders and review their common traits and characteristics. You will learn essential tools for dealing with Personality Disorders such as boundary setting, clear communication, and effective classroom management. In addition, you will review relevant mental health resources and when and how to make appropriate referrals to counseling, accessibility services, and student conduct. Why should you attend: If students with personality disorders are not managed effectively, their behavior can have a negative impact on teaching and learning. Areas Covered in the Session: Ten types of Personality Disorders Prevalence and Demographics Developmental issues Common traits and characteristics of Personality Dis
Roger Steven

ICD-10 and Other Factors Affecting Your Cash Flow - 0 views

  •  
    Overview: As the healthcare industry moves toward a value based reimbursement model rather than fee for service, it is crucial that the provider and ancillary staff understand how ineffective reporting can lead to dollars lost. We will review the 3 critical areas that require skilled management. Understand that patients are more educated about their healthcare and are increasingly responsible for more out of pocket costs. High dollar deductibles may result in self pay realities and bad debt increases. Learn areas that increase your chances for an audit. Are you ready for the challenge? Why should you Attend: Revenue is dependent upon proficiency in multiple areas. In today's environment, it is risky to maintain the status quo and increasingly important to obtain and maintain skilled business staff. The granularity of the ICD-10 code set requires understanding of the official coding conventions and guidelines, the ability to apply those guidelines, and the ability to recognize when reporting may lead to revenue delay, reduction or loss. Additionally, other factors affect your revenue stream. This includes patients with high deductible plans, collection of much more than a small co-pay, and staff understanding of regulations that govern telephone collection activity. Don't leave money on the table or invite an audit into your practice. Audits are often the result of weak billing and coding skills. This program will review several areas that will cost you money if poorly handled. Areas Covered in the Session: Required specificity in coding Documentation necessary for ICD-10 reporting Why coders must frequently query for clarification How ambiguous diagnosis reporting affects you r bottom line Internal collections versus outsourcing. What should you consider Staff effective in handling problem claims? Developing appeals? Who Will Benefit: Coders Billers Revenue cycle Physicians Mid-level providers Nurses Claims follow-up Managers Managers Speaker Profil
Roger Steven

Food Safety and Security are two faces of the coin - 0 views

  •  
    Food Safety and Security are two faces of the coin : Food safety and security are two different, but closely related concepts. Although part of the same aspect, they vary in their application and meaning. Both are equally important in ensuring that populations of the world get food that is sufficient and nutritious. Food safety and security are complete without each other. Food safety complements food security, and vice versa. Food safety : Food safety is essentially about the safety of the ingredients that go into food. If food is being sourced from a farm, the food makers have to ensure that the farm has ensured safety standards in producing this food. Food safety is concerned about the amount of chemicals and fertilizers used in production of food. It is also concerned with how much residual pesticide, which could cause harm to humans when the food that is grown using it, is left in the final product, and so on. Food safety is related to and is dependent on factors such as demographics, inputs that go into the cultivation and production of food, availability of water for production of safe food, the use of energy sources in the safe production of food, climate change, etc. Now, food security : Food security, on the other hand, is about more about the food supply chain. When food arrives from the producer to the consumer, it goes through a complex chain that can many times span entire continents. Food may also be sourced and consumed locally. In either case, there is a need to ensure that the points that food travels in and reaches are secure. Ensuring quality throughout : The aim of food security is to ensure that food which travels through many chains and stages should be clean at all these stages. This means that security has to be ensured from rodents and other forms of disturbances at the agricultural fields in which food is produced, then at the granaries in which it is stored, at the routes that it travels, then at the location at which food is pr
Roger Steven

HIPAA 2016 -Texting and Emailing - 0 views

  •  
    Overview: This lesson will be going into great detail regarding your practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. I will uncover myths versus reality as it relates to this very enigmatic law based on over 600 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). In addition this course will cover the highest risk factors for being sued for wrongful disclosures of PHI and the manner in which patients are now using state laws to sue for wrongful disclosures. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling more than is necessarily required. Why should you Attend: HIPAA NOW HAS TEETH! Be prepared for what's new in 2016! Protect your practice or business! What factors might spurn a HIPAA audit? …are you doing these things? Why are the Feds enforcing after all these years? It is important to understand the new changes going on at Health and Human Services as it relates to enforcement of HIPAA for both covered entities and business associates as it relates to portable devices, texting, and emailing of PHI. You need to know how to avoid being low hanging in terms of audit risk as well as being sued by individuals who have had their PHI wrongfully discloses due to bad IT practices. I have also been expert witness on multiple court cases where a business or medical practice is being sued for not doing their due diligence to minimize risk. Areas Covered in the Session: Updates for 2016 BYOD Portable devices B
Roger Steven

Differences between Device and Drug Clinical Research- A Jeopardy Learning Game - 0 views

  •  
    Overview: Drug and device research is confusing and difficult on its own but when you start combining drugs with devices the regulatory landscape changes as there are more nuances to deal with. Knowing how drug and device studies are each regulated is important in navigating the challenges posed by studies that wish to use both. It is also important to be aware of current guidance affecting the use of both drugs and devices in a study as well current guidance affecting the classification of devices. Why should you attend: Information on drugs and devices is plentiful. But, it can also be daunting .The webinar will give attendees a foundation and a starting point on which they can build. Learning objectives: Define drug research Define device research Explore the differences between the two Describe requirements when drugs and devices are combined in one study Areas Covered in the Session: Defining Drug Research FDA approved drugs Investigational drugs Compassionate use Defining Device Research FDA approved devices 510 K devices Humanitarian Device Exemptions Invitro Diagnostic Devices Investigational Devices Federal regulations governing drugs and devices Guidance governing drugs and devices Combining devices and drugs into one study What are the requirements? What are the regulations and guidance? How these studies are reviewed Who Will Benefit: Investigators Researchers Research Staff Study Coordinators Auditors Research Administrators Speaker Profile Sarah Fowler-Dixon is Education Specialist and instructor with Washington University School of Medicine. She has developed a comprehensive education program for human subject research which has served as a model for other institutions. She crafted budgets, policies, procedures, reporting, and training for the new program. She has initiated the planning, development, authorship and implementation of many human subjects research policies, practices, guidelines, submission and reviewer forms often working with st
« First ‹ Previous 41 - 60 of 344 Next › Last »
Showing 20 items per page